Uncovering Large Scale Fraud Operations
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore advanced fraud techniques and countermeasures in this 40-minute RSA Conference talk. Delve into how adversaries exploit digital transformation to automate credential theft and account takeovers on an unprecedented scale. Learn about sophisticated attack tactics, including fishing, SSL certificate manipulation, and session randomization. Discover new delivery methods and anti-research techniques employed by cybercriminals. Examine real-world examples of Instagram phishing, mobile emulator exploitation, and device fingerprint spoofing. Understand the role of artificial intelligence in modern phishing attacks. Gain valuable insights on protecting against these evolving threats and implementing effective security measures to safeguard digital assets and user accounts.
Syllabus
Introduction
Agenda
Digital Transformation
New Targets
Attack Tactics
Fishing
SSL Certificates
Session Randomization Folders
New Delivery Methods
AntiResearch Techniques
Session Protection Techniques
Blocked AP List
Reverse Proxy Phishing
Instagram Phishing
What is Mobile Emulator
Device Fingerprint Spoofing
Example
Network Connection
Scripts
Second Factor Authentication
Transfer of Funds
Artificial Intelligence
Phishing
What you need to do
Thank you
Taught by
RSA Conference
Related Courses
The Docker for DevOps course: From development to productionUdemy A'dan Z'ye Wordpress ve İnternet Sitesinden Para Kazanmak
Udemy Microsoft Azure Developer: Create Azure App Service Web Apps
Pluralsight Managing Microsoft Azure App Services
Pluralsight Creating and Configuring New Websites in IIS
Pluralsight